Combating Spyware in the Enterprise -  Paul Piccard

Combating Spyware in the Enterprise (eBook)

Discover, Detect, and Eradicate the Internet's Greatest Threat

(Autor)

eBook Download: PDF
2006 | 1. Auflage
448 Seiten
Elsevier Science (Verlag)
978-0-08-050222-9 (ISBN)
Systemvoraussetzungen
41,12 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.

Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate, web filtering, using FireFox, MacOSX, or Linux, patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.

* A recent survey published by Information Security Magazine stated that combating spyare was the #2 priority for security professionals in 2005
* Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.* A recent survey published by Information Security Magazine stated that "e;combating spyare"e; was the #2 priority for security professionals in 2005* Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors

Front Cover 1
Combating Spyware in the Enterprise 4
Copyright Page 5
Contents 14
Chapter 1. An Overview of Spyware 22
Introduction 23
Spyware: Defined 23
Malware: Defined 28
Adware: Defined 30
Parasiteware: Defined 32
Phishing: Defined 33
Botnets: Defined 39
Summary 42
Solutions Fast Track 42
Frequently Asked Questions 45
Chapter 2. The Transformation of Spyware 48
Introduction 49
The Humble Beginnings 49
Spyware in the Twenty-First Century 60
The Future of Spyware 64
Summary 66
Solutions Fast Track 66
Frequently Asked Questions 68
Chapter 3. Spyware and the Enterprise Network 70
Introduction 71
Keystroke Loggers 72
Trojan Encapsulation 83
Spyware and Backdoors 89
Summary 96
Solutions Fast Track 96
Frequently Asked Questions 98
Chapter 4. Real Spyware—Crime, Economic Espionage, and Espionage 100
Introduction 101
White to Gray to Black— Increasing Criminal Use of Spyware 102
It's All in the Delivery 109
Phishing Detection 121
Reporting Phishing 129
Bot Detection 137
Reporting Botnets 146
Summary 152
Solutions Fast Track 156
Frequently Asked Questions 162
Chapter 5. Solutions for the End User 164
Introduction 165
Freeware Solutions 165
Toolbar Solutions 200
Licensed Solutions 206
Summary 216
Solutions Fast Track 218
Frequently Asked Questions 219
Chapter 6. Forensic Detection and Removal 222
Introduction 223
Manual Detection Techniques 223
Detection and Removal Tools 244
Summary 279
Solutions Fast Track 281
Frequently Asked Questions 283
Chapter 7. Dealing with Spyware in a Non-Microsoft World 286
Introduction 287
Spyware and Linux 287
Spyware and the Macintosh 295
Summary 303
Solutions Fast Track 304
Frequently Asked Questions 305
Chapter 8. The Frugal Engineer's Guide to Spyware Prevention 308
Introduction 309
Locking Down Internet Explorer 309
Developing a Security Update Strategy 322
Securing E-mail 334
Securing Windows 339
Summary 350
Solutions Fast Track 351
Frequently Asked Questions 353
Appendix A: Malware, Money Movers, and Ma Bell Mayhem! 356
Introduction 357
Mule Driving and Money Laundering 357
Phishers Phone Home 363
Slithering Scalability 374
The Phuture of Phishing 391
Summary 392
Solutions Fast Track 392
Frequently Asked Questions 394
Index 396

Erscheint lt. Verlag 4.8.2006
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Wirtschaft Betriebswirtschaft / Management
ISBN-10 0-08-050222-9 / 0080502229
ISBN-13 978-0-08-050222-9 / 9780080502229
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90